Christian Wachsmann

According to our database1, Christian Wachsmann authored at least 34 papers between 2006 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Remanence Decay Side-Channel: The PUF Case.
IEEE Trans. Information Forensics and Security, 2016

2015
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
IACR Cryptology ePrint Archive, 2015

Security and privacy challenges in industrial internet of things.
Proceedings of the 52nd Annual Design Automation Conference, 2015

TyTAN: tiny trust anchor for tiny devices.
Proceedings of the 52nd Annual Design Automation Conference, 2015

SEDA: Scalable Embedded Device Attestation.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, 2014

Mobile Trusted Computing.
Proceedings of the IEEE, 2014

PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

Physical Security Primitives - A Survey on Physically Unclonable Functions and PUF-Based Security Solutions.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013
Trusted and privacy-preserving embedded systems advances in design, analysis and application of lightweight privacy-preserving authentication and physical security primitives.
PhD thesis, 2013

Towards Provably Secure Software Attestation.
IACR Cryptology ePrint Archive, 2013

Vertrauenswürdige und privatheitsbewahrende eingebettete Systeme basierend auf Physically Unclonable Functions.
Proceedings of the Ausgezeichnete Informatikdissertationen 2013, 2013

Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

A security framework for the analysis and design of software attestation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version).
IACR Cryptology ePrint Archive, 2012

SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version).
IACR Cryptology ePrint Archive, 2012

SmartTokens: Delegable Access Control with NFC-Enabled Smartphones.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs.
Proceedings of the Financial Cryptography and Data Security, 2012

PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
Recyclable PUFs: logically reconfigurable PUFs.
J. Cryptographic Engineering, 2011

Recyclable PUFs: Logically Reconfigurable PUFs.
IACR Cryptology ePrint Archive, 2011

Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
IACR Cryptology ePrint Archive, 2011

Short paper: lightweight remote attestation using physical functions.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

A Formalization of the Security Features of Physical Functions.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Poster: practical embedded remote attestation using physically unclonable functions.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Trusted Computing.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Impossibility Results for RFID Privacy Notions.
Trans. Computational Science, 2010

Anonymous Authentication for RFID Systems.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

On RFID Privacy with Mutual Authentication and Tag Corruption.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Location Privacy in RFID Applications.
Proceedings of the Privacy in Location-Based Applications, 2009

Anonymizer-Enabled Security and Privacy for RFID.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
User Privacy in Transport Systems Based on RFID E-Tickets.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

2006
TCG inside?: a note on TPM specification compliance.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006


  Loading...